Sciweavers

3888 search results - page 673 / 778
» Change-Driven Model Transformations
Sort
View
CEC
2007
IEEE
15 years 10 months ago
A Utile Function Optimizer
Abstract— We recast the problem of unconstrained continuous evolutionary optimization as inference in a fixed graphical model. This approach allows us to address several pervasi...
Christopher K. Monson, Kevin D. Seppi, James L. Ca...
DEXAW
2007
IEEE
104views Database» more  DEXAW 2007»
15 years 10 months ago
An MDA Approach to Implement Personal IR Tools
We introduce TIRA1 , a software architecture for the rapid prototyping of tailored information retrieval (IR) tools. TIRA allows to compose personal IR tools from atomic IR servic...
Sven Meyer zu Eissen, Benno Stein
LICS
2007
IEEE
15 years 10 months ago
Local Action and Abstract Separation Logic
tion and Abstract Separation Logic Cristiano Calcagno Imperial College, London Peter W. O’Hearn Queen Mary, University of London Hongseok Yang Queen Mary, University of London S...
Cristiano Calcagno, Peter W. O'Hearn, Hongseok Yan...
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
15 years 10 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 10 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai